Search for packages
| purl | pkg:deb/debian/linux@6.1.112-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-129n-rzn7-4bcb | kernel: s390/dasd: fix error recovery leading to data corruption on ESE devices |
CVE-2024-45026
|
| VCID-1f7d-mqsz-kqh1 | kernel: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() |
CVE-2024-46686
|
| VCID-1h2t-hhzx-77e2 | kernel: smack: tcp: ipv4, fix incorrect labeling |
CVE-2024-47659
|
| VCID-1r9m-mwej-xyhb | kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump |
CVE-2024-27017
|
| VCID-1utw-6bxm-bfff | kernel: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE |
CVE-2024-45025
|
| VCID-21bh-d6n2-r3du | kernel: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] |
CVE-2024-46815
|
| VCID-285d-yzd9-sfhk | kernel: usb: typec: ucsi: Fix null pointer dereference in trace |
CVE-2024-46719
|
| VCID-2ffw-fcvf-nqdu | kernel: bpf: Silence a warning in btf_type_id_size() |
CVE-2023-54247
|
| VCID-317b-2h1w-9ud1 | kernel: mptcp: pm: avoid possible UaF when selecting endp |
CVE-2024-44974
|
| VCID-35pr-a5xg-4ugy | kernel: ipv6: prevent UAF in ip6_send_skb() |
CVE-2024-44987
|
| VCID-3auu-qywm-cyd2 | kernel: drm/amdgpu: Fix out-of-bounds write warning |
CVE-2024-46725
|
| VCID-3var-3dbf-rubz | kernel: usb: gadget: aspeed_udc: validate endpoint index for ast udc |
CVE-2024-46836
|
| VCID-3yf8-k2fy-ckf4 | kernel: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry |
CVE-2024-46822
|
| VCID-48dc-vthz-ukd4 | kernel: mptcp: pm: fix ID 0 endp usage after multiple re-creations |
CVE-2024-46711
|
| VCID-4e2j-gxau-gken | kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok |
CVE-2024-44990
|
| VCID-4tq9-e1by-ybev | kernel: drm/amd/display: Add array index check for hdcp ddc access |
CVE-2024-46804
|
| VCID-56h2-bdrq-3yeh | kernel: perf/aux: Fix AUX buffer serialization |
CVE-2024-46713
|
| VCID-5716-hhg8-ryb6 | kernel: spi: rockchip: Resolve unbalanced runtime PM / system PM handling |
CVE-2024-46846
|
| VCID-5e2f-3cvw-tkg5 | kernel: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() |
CVE-2024-46735
|
| VCID-5ea3-gwak-sbf6 | kernel: btrfs: clean up our handling of refs == 0 in snapshot delete |
CVE-2024-46840
|
| VCID-5sx4-erkf-qbb4 | kernel: drm/amdgpu: fix mc_data out-of-bounds read warning |
CVE-2024-46722
|
| VCID-5vfe-6xqu-vyfy | kernel: ila: call nf_unregister_net_hooks() sooner |
CVE-2024-46782
|
| VCID-5ww6-ujwj-9bdf | kernel: f2fs: fix to truncate preallocated blocks in f2fs_file_open() |
CVE-2024-43859
|
| VCID-632y-x88e-zkav | kernel: drm/amd/display: Assign linear_pitch_alignment even for VM |
CVE-2024-46732
|
| VCID-66c7-d5qq-1kgc | kernel: drm/amd/display: Ensure index calculation will not overflow |
CVE-2024-46726
|
| VCID-6vrh-qer8-aqfa | kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes |
CVE-2024-46759
|
| VCID-6wq3-jeud-mfg2 | kernel: net/mlx5e: Take state lock during tx timeout reporter |
CVE-2024-45019
|
| VCID-6zk8-j8jm-c3gw | kernel: apparmor: fix possible NULL pointer dereference |
CVE-2024-46721
|
| VCID-7gs3-vzmf-5qhq | kernel: drm/amdgpu: fix ucode out-of-bounds read warning |
CVE-2024-46723
|
| VCID-8dq4-zu8p-xqgz | kernel: vfs: Don't evict inode under the inode lru traversing context |
CVE-2024-45003
|
| VCID-8e46-n9s3-jbgd | kernel: media: pci: cx23885: check cx23885_vdev_init() return |
CVE-2023-52918
|
| VCID-8qva-q75v-y3b1 | kernel: fou: fix initialization of grc |
CVE-2024-46865
|
| VCID-9dwa-etzm-syhf | kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk |
CVE-2024-46743
|
| VCID-9geu-b53r-kfek | kernel: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number |
CVE-2024-46724
|
| VCID-a5uv-rab1-kkc7 | kernel: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null |
CVE-2024-46714
|
| VCID-adr9-vryj-fqah | kernel: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object |
CVE-2024-46798
|
| VCID-adwd-98zy-qqf7 | kernel: gpio: prevent potential speculation leaks in gpio_device_get_desc() |
CVE-2024-44931
|
| VCID-askw-fcsn-h7c5 | kernel: staging: iio: frequency: ad9834: Validate frequency parameter value |
CVE-2024-47663
|
| VCID-aspx-2ymv-vqhb | kernel: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) |
CVE-2024-47667
|
| VCID-b2at-va88-pud8 | kernel: memcg: protect concurrent access to mem_cgroup_idr |
CVE-2024-43892
|
| VCID-bmpn-zgd9-r3d6 | kernel: ELF: fix kernel.randomize_va_space double read |
CVE-2024-46826
|
| VCID-bpdk-eh92-qffx | kernel: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 |
CVE-2024-46817
|
| VCID-bpq4-z58k-f3cg | kernel: drm/amd/display: Check gpio_id before used as array index |
CVE-2024-46818
|
| VCID-by9q-frk7-5qaj | kernel: Squashfs: sanity check symbolic link size |
CVE-2024-46744
|
| VCID-carf-knme-xkb4 | kernel: soc: qcom: cmd-db: Map shared memory as WC, not WB |
CVE-2024-46689
|
| VCID-ce54-6eyp-ryd2 | kernel: pinctrl: single: fix potential NULL dereference in pcs_get_function() |
CVE-2024-46685
|
| VCID-cf8d-ma6m-c3g3 | kernel: btrfs: replace BUG_ON() with error handling at update_ref_for_cow() |
CVE-2024-46752
|
| VCID-cmgf-3zzy-h7en | kernel: drm/amd/amdgpu: Check tbo resource pointer |
CVE-2024-46807
|
| VCID-cqvu-5wzs-8ufk | kernel: drm/amdgpu: fix dereference after null check |
CVE-2024-46720
|
| VCID-d1cf-cn7n-2fds | kernel: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 |
CVE-2024-45022
|
| VCID-d7mp-beeu-a3d8 | kernel: perf/x86/intel: Limit the period on Haswell |
CVE-2024-46848
|
| VCID-e5jj-cumq-1qeg | kernel: ksmbd: unset the binding mark of a reused connection |
CVE-2024-46795
|
| VCID-e6b3-8s65-nbhj | kernel: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS |
CVE-2024-46830
|
| VCID-e6c8-xx93-vbcx | kernel: mptcp: pm: Fix uaf in __timer_delete_sync |
CVE-2024-46858
|
| VCID-eg4s-vt9f-x3at | kernel: fou: remove warn in gue_gro_receive on unsupported protocol |
CVE-2024-44940
|
| VCID-eng5-npdr-qbff | kernel: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup |
CVE-2024-46747
|
| VCID-epms-7dzu-6kaq | kernel: i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup |
CVE-2024-47665
|
| VCID-es9x-2mxv-k3gw | kernel: usb: dwc3: st: fix probed platform device ref count on probe error path |
CVE-2024-46674
|
| VCID-exfu-sgtk-d7a7 | kernel: dma-buf: heaps: Fix off-by-one in CMA heap fault handler |
CVE-2024-46852
|
| VCID-f35u-ajp9-aub7 | kernel: PCI: Add missing bridge lock to pci_bus_lock() |
CVE-2024-46750
|
| VCID-f7nv-pzr1-r3e7 | kernel: net: dpaa: Pad packets to ETH_ZLEN |
CVE-2024-46854
|
| VCID-fdru-hg25-1yeu | kernel: ipv6: prevent possible UAF in ip6_xmit() |
CVE-2024-44985
|
| VCID-ffjq-6qe6-mkbb | kernel: um: line: always fill *error_out in setup_one_line() |
CVE-2024-46844
|
| VCID-fgd8-hc11-u3g4 | kernel: sched: sch_cake: fix bulk flow accounting logic for host fairness |
CVE-2024-46828
|
| VCID-fk6p-cjft-2fbt | kernel: btrfs: fix race between direct IO write and fsync when using same fd |
CVE-2024-46734
|
| VCID-fm5n-9nsj-s3at | kernel: USB: usbtmc: prevent kernel-usb-infoleak |
CVE-2024-47671
|
| VCID-fm6x-ca1m-wuhj | kernel: usb: dwc3: core: Prevent USB core invalid event buffer address access |
CVE-2024-46675
|
| VCID-fws4-y57e-c7a4 | kernel: nilfs2: protect references to superblock parameters exposed in sysfs |
CVE-2024-46780
|
| VCID-g7g9-zung-9fgb | kernel: HID: amd_sfh: free driver_data after destroying hid device |
CVE-2024-46746
|
| VCID-gdt1-jgex-eug8 | kernel: nvmet-tcp: fix kernel crash if commands allocation fails |
CVE-2024-46737
|
| VCID-gh5z-xrgd-9bcs | kernel: net/mlx5: Fix bridge mode operations when there are no VFs |
CVE-2024-46857
|
| VCID-gque-hhdb-ufey | kernel: drm/amd/display: added NULL check at start of dc_validate_stream |
CVE-2024-46802
|
| VCID-gsav-5b9s-hbdr | kernel: drm/amd/display: Check msg_id before processing transcation |
CVE-2024-46814
|
| VCID-gw8y-j79e-cue7 | kernel: ethtool: check device is present when getting link settings |
CVE-2024-46679
|
| VCID-gwjq-s48w-e3aa | kernel: memcg_write_event_control(): fix a user-triggerable oops |
CVE-2024-45021
|
| VCID-gy8t-jfpr-efaj | kernel: netfilter: nft_socket: fix sk refcount leaks |
CVE-2024-46855
|
| VCID-gzfh-c35y-2kh4 | kernel: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() |
CVE-2024-46755
|
| VCID-haaz-25w4-wfg4 | kernel: nilfs2: fix missing cleanup on rollforward recovery error |
CVE-2024-46781
|
| VCID-hbv7-qscr-gfes | kernel: drm/amdgpu: fix the waring dereferencing hive |
CVE-2024-46805
|
| VCID-hmsk-xsy5-syad | kernel: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped |
CVE-2024-47673
|
| VCID-hpjn-8ky9-yugh | kernel: nfc: pn533: Add poll mod list filling check |
CVE-2024-46676
|
| VCID-htqg-96nd-1bfa | kernel: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails |
CVE-2024-44982
|
| VCID-jbkc-8tms-33g8 | kernel: sch/netem: fix use after free in netem_dequeue |
CVE-2024-46800
|
| VCID-jj78-a4gk-wudp | kernel: uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind |
CVE-2024-46739
|
| VCID-jtzh-kcck-e3bq | kernel: Input: MT - limit max slots |
CVE-2024-45008
|
| VCID-jw6e-24ag-3ucs | kernel: can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open |
CVE-2024-46791
|
| VCID-jzfn-k82f-s3fw | kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl |
CVE-2023-31083
|
| VCID-kbnx-47cx-f3eq | kernel: gtp: fix a potential NULL pointer dereference |
CVE-2024-46677
|
| VCID-m28d-uyxy-ukds | kernel: net: dsa: mv88e6xxx: Fix out-of-bound access |
CVE-2024-44988
|
| VCID-m9us-wuhh-7fat | kernel: atm: idt77252: prevent use after free in dequeue_rx() |
CVE-2024-44998
|
| VCID-mdgm-tgef-1ycd | kernel: fsnotify: clear PARENT_WATCHED flags lazily |
CVE-2024-47660
|
| VCID-mfnd-m99x-k7f2 | kernel: posix-timers: Ensure timer ID search-loop limit is valid |
CVE-2023-53728
|
| VCID-mkza-wghx-cfcr | kernel: char: xillybus: Don't destroy workqueue from work item running on it |
CVE-2024-45007
|
| VCID-myzt-t2h1-ubav | kernel: binder: fix UAF caused by offsets overwrite |
CVE-2024-46740
|
| VCID-n6b8-k7at-ebh9 | kernel: PCI/MSI: Fix UAF in msi_capability_init |
CVE-2024-41096
|
| VCID-n7p8-ebkm-87gy | kernel: drm/amd/display: avoid using null object of framebuffer |
CVE-2024-46694
|
| VCID-nh1c-h3td-tkc7 | kernel: nilfs2: fix state management in error path of log writing function |
CVE-2024-47669
|
| VCID-nuzn-h4hz-hyh4 | kernel: spi: nxp-fspi: fix the KASAN report out-of-bounds bug |
CVE-2024-46853
|
| VCID-p7k7-1jab-jked | kernel: thunderbolt: Mark XDomain as unplugged when router is removed |
CVE-2024-46702
|
| VCID-p8k5-tr7y-vffx | kernel: drm/amdgpu: Fix smatch static checker warning |
CVE-2024-46835
|
| VCID-paq6-d6fg-fbaa | kernel: ASoC: meson: axg-card: fix 'use-after-free' |
CVE-2024-46849
|
| VCID-pfaz-renw-kuar | kernel: mmc: mmc_test: Fix NULL dereference on allocation failure |
CVE-2024-45028
|
| VCID-q2ez-zz3u-xfg6 | kernel: fuse: Initialize beyond-EOF page contents before setting uptodate |
CVE-2024-44947
|
| VCID-q2hs-ferx-fuds | kernel: udf: Avoid excessive partition lengths |
CVE-2024-46777
|
| VCID-q3cj-np4m-fudq | kernel: ocfs2: add bounds checking to ocfs2_xattr_find_entry() |
CVE-2024-47670
|
| VCID-q5uw-z4sr-9ud3 | kernel: ata: libata-core: Fix null pointer dereference on error |
CVE-2024-41098
|
| VCID-q6ez-rrgj-p3ht | kernel: can: bcm: Remove proc entry when dev is unregistered. |
CVE-2024-46771
|
| VCID-qc2g-nacz-wkfd | kernel: tcp: prevent concurrent execution of tcp_sk_exit_batch |
CVE-2024-44991
|
| VCID-qwt2-d9kn-xueb | kernel: drm/amd/pm: Fix negative array index read |
CVE-2024-46821
|
| VCID-rd2g-en5y-6fbf | kernel: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv |
CVE-2024-46761
|
| VCID-ru4t-7413-7kay | kernel: tcp_bpf: fix return value of tcp_bpf_sendmsg() |
CVE-2024-46783
|
| VCID-rvxd-bgpj-8kdp | kernel: net: hns3: fix a deadlock problem when config TC during resetting |
CVE-2024-44995
|
| VCID-sddt-bfaw-zbew | kernel: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup |
CVE-2024-46784
|
| VCID-srta-uqkm-dbg7 | kernel: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() |
CVE-2024-41016
|
| VCID-suuf-16dt-pkgv | kernel: mptcp: pm: only mark 'subflow' endp as available |
CVE-2024-45010
|
| VCID-syfn-z7vm-qqh1 | kernel: Linux kernel: BPF verifier log truncation via crafted user input |
CVE-2023-54145
|
| VCID-t3x3-9w7q-ube1 | kernel: netfilter: flowtable: initialise extack before use |
CVE-2024-45018
|
| VCID-t5d6-k453-mug7 | kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling |
CVE-2024-46829
|
| VCID-t6g3-n2fm-abg8 | kernel: mm: avoid leaving partial pfn mappings around in error case |
CVE-2024-47674
|
| VCID-tayp-ex4q-fbdh | kernel: jfs: Fix shift-out-of-bounds in dbDiscardAG |
CVE-2024-44938
|
| VCID-tga5-z7cd-fbf3 | kernel: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ |
CVE-2024-46810
|
| VCID-tj5a-2jkt-tkde | kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc |
CVE-2024-42228
|
| VCID-u825-z9zt-6bhn | kernel: scsi: aacraid: Fix double-free on probe failure |
CVE-2024-46673
|
| VCID-uu31-q5pz-cqfa | kernel: net/mlx5e: SHAMPO, Fix incorrect page release |
CVE-2024-46717
|
| VCID-v3up-q48a-efhg | kernel: ice: Add netif_device_attach/detach into PF reset flow |
CVE-2024-46770
|
| VCID-v52f-k7p2-qbcu | kernel: ipv6: fix possible UAF in ip6_finish_output2() |
CVE-2024-44986
|
| VCID-v9vh-3bu7-q7cn | kernel: fou: Fix null-ptr-deref in GRO. |
CVE-2024-46763
|
| VCID-vavh-7yb6-rbg9 | kernel: ext4: do not create EA inode under buffer lock |
CVE-2024-40972
|
| VCID-vgea-u817-jbg5 | kernel: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses |
CVE-2024-46859
|
| VCID-vtp1-knbs-sqdw | kernel: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration |
CVE-2024-46812
|
| VCID-vxwb-8x3c-rkfu | kernel: char: xillybus: Check USB endpoints when probing device |
CVE-2024-45011
|
| VCID-vyp5-hhk2-6qf8 | kernel: btrfs: fix extent map use-after-free when adding pages to compressed bio |
CVE-2024-42314
|
| VCID-vypr-7u65-ayaz | kernel: fs/netfs/fscache_cookie: add missing "n_accesses" check |
CVE-2024-45000
|
| VCID-w79c-atgr-gkd9 | kernel: drm/amd/pm: fix the Out-of-bounds read warning |
CVE-2024-46731
|
| VCID-wcet-4wex-rfdy | kernel: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed |
CVE-2024-46832
|
| VCID-wr7j-r4t5-1bgu | kernel: wifi: cfg80211: check A-MSDU format more carefully |
CVE-2024-35937
|
| VCID-wra1-cqzm-57gc | kernel: driver: iio: add missing checks on iio_info's callback access |
CVE-2024-46715
|
| VCID-x765-v6sg-sbfy | kernel: rtla/osnoise: Prevent NULL dereference in error handling |
CVE-2024-45002
|
| VCID-x8he-jwxh-s7bt | kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() |
CVE-2024-47668
|
| VCID-xaye-wwt2-fkb2 | kernel: Bluetooth: RFCOMM: Fix not validating setsockopt user input |
CVE-2024-35966
|
| VCID-xbgm-4nyj-27ec | kernel: netfilter: flowtable: validate vlan header |
CVE-2024-44983
|
| VCID-xdty-z9se-6ufj | kernel: Bluetooth: MGMT: Add error handling to pair_device() |
CVE-2024-43884
|
| VCID-xm4v-72mk-8qg1 | kernel: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 |
CVE-2024-46707
|
| VCID-y2tb-nyra-5kf3 | kernel: xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration |
CVE-2024-45006
|
| VCID-y78e-a98j-afgk | kernel: x86/tdx: Fix data leak in mmio_read() |
CVE-2024-46794
|
| VCID-y84k-pyqr-xkes | kernel: bonding: fix xfrm real_dev null pointer dereference |
CVE-2024-44989
|
| VCID-y8ej-kzxm-9bhs | kernel: kcm: Serialise kcm_sendmsg() for the same socket. |
CVE-2024-44946
|
| VCID-yagq-3yw6-rfhm | kernel: gtp: pull network headers in gtp_dev_xmit() |
CVE-2024-44999
|
| VCID-yaqa-ccbd-jbf4 | kernel: drm/amdgpu: Validate TA binary size |
CVE-2024-44977
|
| VCID-yuwc-h2qn-r7dv | kernel: drm/amd/display: Check denominator pbn_div before used |
CVE-2024-46773
|
| VCID-ywnx-fxr4-cudy | kernel: Input: uinput - reject requests with unreasonable number of slots |
CVE-2024-46745
|
| VCID-z8nz-ae75-ufa1 | kernel: i2c: tegra: Do not mark ACPI devices as irq safe |
CVE-2024-45029
|
| VCID-z8y6-gbv7-zudr | kernel: netem: fix return value if duplicate enqueue fails |
CVE-2024-45016
|
| VCID-zdgf-yw92-rfa2 | kernel: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init |
CVE-2024-35943
|
| VCID-zge5-hkpz-k3ax | kernel: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 |
CVE-2024-46819
|
| VCID-zm1u-s4bs-ubhy | kernel: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor |
CVE-2024-46716
|
| VCID-zmp7-m12g-zuby | kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() |
CVE-2024-46738
|
| VCID-zms6-v69x-mue5 | kernel: virtio_net: Fix napi_skb_cache_put warning |
CVE-2024-43835
|
| VCID-zn5u-s9sp-eyb8 | kernel: jfs: fix null ptr deref in dtInsertEntry |
CVE-2024-44939
|
| VCID-zqpt-es2k-hfg8 | kernel: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX |
CVE-2024-46871
|
| VCID-zrun-c4af-bfen | kernel: mptcp: pm: only decrement add_addr_accepted for MPJ req |
CVE-2024-45009
|